TrainACE - IT and Cybersecurity Training Blog

How Do I Get a Pentesting Job?

[fa icon="calendar'] Dec 11, 2019 11:02:00 AM / by Paul Ricketts posted in Pentesting

[fa icon="comment"] 0 Comments

Penetration testing (pentesting) positions are quickly becoming common in IT job listings across the country. This is especially true in areas like Washington, DC where the high number of government agencies and defense contractors increases the need for effective data defense and the ability to identify potential network weaknesses on-demand.

Read More [fa icon="long-arrow-right"]

Our New Video!! Phishing with Meterpreter & Ettercap: A CEH Demo Lab

[fa icon="calendar'] Nov 25, 2013 2:01:29 PM / by Ryan Corey posted in CEH, Cisco, Cybersecurity, Hacking, Pentesting

[fa icon="comment"] 0 Comments

Christian R. Crank, a security researcher and instructor for us recently created this video on a phishing attack using Meterpreter and Ettercap. This is a lab that students perform in our Certified Ethical Hacker class. Enjoy!

Read More [fa icon="long-arrow-right"]

The Steps to Becoming a Penetration Tester

[fa icon="calendar'] Nov 22, 2013 9:35:26 AM / by The TrainACE Team posted in CEH, Cisco, Online Training, Pentesting, Programming

[fa icon="comment"] 0 Comments

https://www.trainace.com/products/ceh-certified-ethical-hacker-training-and-certificationAccording to statistics provided by GO-Gulf.com, the cost of cyber crime will top $100 billion this year. Cyber crime affects 18 victims per second for a total of around 556 million victims per year. Just recently, the FBI warned that cyber attacks have eclipsed domestic terrorism as the primary threat to U.S. security. Penetration testers use their skills to help organizations fix vulnerabilities in their systems. But what are the steps to becoming a penetration tester?

Read More [fa icon="long-arrow-right"]

New Version of the ECSA / LPT (v5) Certification by EC-Council, Coming in 2014

[fa icon="calendar'] Oct 24, 2013 2:02:52 PM / by Ryan Corey posted in CEH, Cisco, Cybersecurity, EC-Council, Pentesting

[fa icon="comment"] 0 Comments

EC-Council has just announced that a much overdue improvement and version upgrade to the ECSA / LPT curriculum will be coming to training centers (ours, of course, is the only one that matters) at the beginning of 2014.

Read More [fa icon="long-arrow-right"]

The Top 5 Cyber Security Skill Sets for Northern Virginia's Tech Community in 2014

[fa icon="calendar'] Oct 22, 2013 8:45:15 AM / by Ryan Corey posted in Cisco, Cybersecurity, Exploits, Malware, mobile security, Pentesting, threat intelligence

[fa icon="comment"] 0 Comments

Most people think of Silicon Valley as the tech capital of the world, but it's in northern Virginia nearly 3,000 miles away that many security firms and defense contractors operate. As of 2009, more than half of the world's Internet traffic passed through this region.

Read More [fa icon="long-arrow-right"]

Spammed and Hacked: How Social Media Can Pose a Security Risk

[fa icon="calendar'] Aug 26, 2013 5:12:40 AM / by Ryan Corey posted in advanced persistent threat, CEH, Cisco, cyber war, Cybersecurity, Hacking, information assurance, Pentesting

[fa icon="comment"] 0 Comments

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Read More [fa icon="long-arrow-right"]

Look Out IT Job Seekers! Cyber Security is the Field to Join

[fa icon="calendar'] Aug 19, 2013 3:45:24 AM / by Ryan Corey posted in advanced persistent threat, Salary, CEH, Cisco, cyber war, Cybersecurity, Hacking, Pentesting

[fa icon="comment"] 0 Comments

As cyber attacks increase in frequency and scandals involving governments hacking into private computers become more commonplace, it's no wonder that one of the most promising fields in the current IT sector would be cyber security. In fact, recent research has indicated that cyber security has grown by more than one hundred percent in the last year. Clearly, anyone seeking a job in the information technology area would do well to start at the first line of defense against hackers.

Read More [fa icon="long-arrow-right"]

Hacked Cars and Hotel Rooms: Time to Rethink Security for a Technological Age

[fa icon="calendar'] Aug 6, 2013 4:02:44 AM / by Ryan Corey posted in advanced persistent threat, CEH, Cisco, cyber war, Cybersecurity, Hacking, Pentesting

[fa icon="comment"] 0 Comments

Criminals have been breaking into websites and electronic databases for many years. Although this can result in huge monetary losses, it rarely injures anyone or causes physical damage. However, hackers are gaining more destructive power as manufacturers add network interfaces and microprocessors to mechanical devices. This is a security threat that we cannot afford to ignore.

Read More [fa icon="long-arrow-right"]

A Video on What the CEH Certification Training with TrainACE will do for Your Career – Jobs, Salary, Facts and Figures

[fa icon="calendar'] May 30, 2013 9:43:12 AM / by Ryan Corey posted in Salary, CEH, Cisco, computer training, Cybersecurity, EC-Council, Hacking, information assurance, Information Technology, Jobs, Online Training, Pentesting

[fa icon="comment"] 0 Comments

Most people who are looking in to taking the Certified Ethical Hacker (CEH) certification training with us want to know a few key points. The CEH certification is arguably the leading baseline penetration testing certification on the market. Our CEH training class prepares people for a career in the field by offering more hands-on training than any other competitor’s class out there. The class also has a pass rate on the certification exam OVER 99% (yes that’s correct, in the last year, about 550 people took the CEH with us and only 5 failed the exam).  As you probably know, we offer classroom based training as well as online options, both are extremely effective.

Read More [fa icon="long-arrow-right"]

The Most Common Jobs for People Who Hold the EC-Council Certified Ethical Hacker (CEH) Certification

[fa icon="calendar'] May 20, 2013 3:45:05 AM / by Ryan Corey posted in CEH, Cisco, Cybersecurity, EC-Council, Hacking, information assurance, Information Technology, Pentesting

[fa icon="comment"] 0 Comments

The term "hacker" is often associated with illegal online activity. However, there are hackers who perform 100 percent legal services, which are based on evaluating the information infrastructures of companies. For those who hold the Certified Ethical Hacker certification from the EC-Council, there are several jobs to consider that come with attractive compensation. Some of the most common jobs for hackers holding the CEH certification include computer forensics, incidence response, penetration testing and security analysis. Penetration testing is the most common job for new hackers, but some later advance to become engineers or take on a wider variety of tasks.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802


or

TrainACE Catalog